Securimage 3.5 URI-based Cross-Site Scripting Vulnerability

Title: Securimage 3.5 URI-based Cross-Site Scripting Vulnerability
Advisory ID: ZSL-2013-5139
Type: Local/Remote
Impact: Cross-Site Scripting
Risk: (3/5)
Release Date: 10.05.2013
Summary
Securimage is an open-source free PHP CAPTCHA script for generating complex images and CAPTCHA codes to protect forms from spam and abuse.
Description
Securimage suffers from a XSS issue in 'example_form.php' that uses the 'REQUEST_URI' variable. The vulnerability is present because there isn't any filtering to the mentioned variable in the affected script. Attackers can exploit this weakness to execute arbitrary HTML and script code in a user's browser session.

--------------------------------------------------------------------------------

/example_form.php:
-------------------------

47: <form method="post" action="<?php echo $_SERVER['REQUEST_URI'] . $_SERVER['QUERY_STRING'] ?>" id="contact_form">

--------------------------------------------------------------------------------

Vendor
Securimage PHP CAPTCHA - http://www.phpcaptcha.org
Affected Version
3.5
Tested On
Apache, PHP 5.3.6
Vendor Status
[21.04.2013] Vulnerability discovered.
[23.04.2013] Contact with the vendor.
[23.04.2013] Vendor replies asking more details.
[23.04.2013] Sent detailed information to the vendor.
[24.04.2013] Working with the vendor.
[30.04.2013] Asked vendor for status update.
[09.05.2013] No reply from the vendor.
[10.05.2013] Public security advisory released.
[15.02.2014] Vendor releases version 3.5.1 to address this issue.
PoC
securimage_xss.txt
Credits
Vulnerability discovered by Gjoko Krstic - <gjoko@zeroscience.mk>
References
[1] http://packetstormsecurity.com/files/121575
[2] http://cxsecurity.com/issue/WLB-2013050082
[3] http://www.securityfocus.com/bid/59796
[4] http://xforce.iss.net/xforce/xfdb/84157
[5] http://osvdb.org/show/osvdb/93439
[6] http://phpcaptcha.org/Securimage_Docs/files/securimage.php.html#source-view
Changelog
[10.05.2013] - Initial release
[11.05.2013] - Added reference [1], [2] and [3]
[14.05.2013] - Added reference [4]
[17.05.2013] - Added reference [5]
[08.03.2015] - Added vendor status and reference [6]
Contact
Zero Science Lab

Web: http://www.zeroscience.mk
e-mail: lab@zeroscience.mk